CVE-2022-24521

Vulnerability updated 4 months ago (2024-05-04T19:13:56.307Z)
Download STIX
Preview STIX
CVE-2022-24521 is a software vulnerability discovered in 2022, characterized by a flaw in the software design or implementation. This specific vulnerability was exploited through modifications to BLF files and was one of four vulnerabilities (including CVE-2022-37969, CVE-2023-23376, and CVE-2023-28252) captured in the wild as zero-days. Zero-day vulnerabilities are software security flaws that are known to the software vendor but have no patch in place to fix them when they are exploited. The exploitation of these vulnerabilities was part of a broader trend identified in the "Windows Common Log File System Driver Elevation Of Privilege Vulnerability". Since 2018, at least thirty-two such vulnerabilities have been discovered, excluding CVE-2023-28252. Notably, three of these vulnerabilities (CVE-2022-24521, CVE-2022-37969, and CVE-2023-23376) were detected in the wild as zero-days, indicating that attackers were able to exploit these vulnerabilities before patches were available. In response to the increasing number of security bugs, Microsoft has released patches for 96 other security bugs as part of April’s Patch Tuesday, including 45 remote code execution vulnerabilities. These efforts underscore the ongoing need for vigilance and swift action in addressing software vulnerabilities, particularly those that can be exploited as zero-days.
Description last updated: 2024-05-04T16:33:22.007Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Windows
Exploits
Ransomware
Kaspersky
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2023-28252Unspecified
3
CVE-2023-28252 is a critical Elevation of Privilege vulnerability found in the Windows Common Log File System (CLFS) driver. This flaw was discovered by Kaspersky researchers while preventing attacks on users, marking it as a zero-day vulnerability. The vulnerability presents a significant risk with
CVE-2023-23376Unspecified
3
CVE-2023-23376 is a software vulnerability, specifically an elevation-of-privilege flaw found in the Windows Common Log File System Driver. This vulnerability allows an attacker to gain system-level privileges, posing a significant risk to unpatched Windows systems. It is similar to another exploit,
CVE-2022-37969Unspecified
3
None
Source Document References
Information about the CVE-2022-24521 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
8 months ago
Windows CLFS Driver zero-days leveraged in ransomware attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
8 months ago
Carbanak Banking Malware Resurfaces with New Ransomware Tactics | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
8 months ago
Windows CLFS and five exploits used by ransomware operators | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
9 months ago
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
DARKReading
9 months ago
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days
CERT-EU
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators
CERT-EU
9 months ago
Windows CLFS and five exploits used by ransomware operators – GIXtools
CISA
2 years ago
#StopRansomware: Cuba Ransomware | CISA
CISA
2 years ago
#StopRansomware: Cuba Ransomware | CISA
CERT-EU
a year ago
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
Securelist
a year ago
Nokoyawa ransomware attacks with Windows zero-day
CSO Online
a year ago
Microsoft patches vulnerability used in Nokoyawa ransomware attacks